MENU

Coins

Exchanges

Bitcoin (BTC)
$ 72,084.86 2,580.96 (% 3.71)
Ethereum (ETH)
$ 4,038.91 133.93 (% 3.43)
XRP (XRP)
$ 0.727106 0.113616 (% 18.52)
Binance Coin (BNB)
$ 519.52 -11.81 (% -2.22)
Tether (USDT)
$ 1.00 0 (% -0.12)
Litecoin (LTC)
$ 105.01 16.80 (% 19.04)
Cardano (ADA)
$ 0.774866 0.057416 (% 8.00)
Bitcoin Cash (BCH)
$ 443.57 17.63 (% 4.14)
Ethereum Classic (ETC)
$ 37.783474 1.333105 (% 3.66)
Stellar (XLM)
$ 0.15958 0.01918 (% 13.66)
Cosmos (ATOM)
$ 13.68 0.54 (% 4.14)
EOS (EOS)
$ 1.24 0.09 (% 8.19)
TRON
$ 0.133004 -0.001235 (% -0.92)
Tezos (XTZ)
$ 1.508825 0.086660 (% 6.09)
NEO (NEO)
$ 18.02 1.05 (% 6.18)
Dash (DASH)
$ 43.44 3.21 (% 7.99)
Holo (HOLO)
$ 0.003539 0.000008 (% 0.23)
Basic Attention Token (BAT)
$ 0.218578 -0.000524 (% -0.24)

SushiSwap dev disagrees with hacker’s ‘billion dollar’ bug finding

A SushiSwap vulnerability report published by an anonymous white-hat hacker has been rejected by the developers behind the popular decentralized exchange.

SushiSwap dev disagrees with hacker’s ‘billion dollar’ bug finding

The hacker and his alleged vulnerabilities within SushiSwap’s network first came to light through media reports. In the same, the hacker claimed users could endure losses of funds worth over $1 billion due to these threats.

The hacker also conceded to going public with the information only after attempts to bring this to the attention of SushiSwap’s developers confidentially did not result in any action.

In the report, the hacker claimed to have found a “vulnerability within the emergencyWithdraw function in two of SushiSwap’s contracts, MasterChefV2 and MiniChefV2.” These contracts govern the exchange’s 2x reward farms and pools on non-Ethereum sidechains such as Binance Smart Chain, Polygon, Fantom, Avalanche, among others.


The emergencyWithdraw function provides a safety net to users using DeFi services, essentially allowing them to immediately withdraw their Liquidity Provider (LP) tokens in the event of an emergency while forfeiting any rewards earned until that point.

According to the hacker, this feature is misleading as it would not work as intended if no rewards are held within the SushiSwap pool.

If the rewards in the pool dry up, they have to be filled manually by the project’s team by using a multi-signature account while often operating from vastly different time zones. The hacker believes this could lead to waiting times of over 10 hours long, before tokens can be withdrawn. The report further elaborated,

Source : ambcrypto.com